A customer is about to enable tree quotas. Which condition must be met when enabling t his feature?
A. Tree directory structure must exist
B. Tree directory structure must not exist
C. Tree must be at the root of the file system
D. Tree must be populated with data
Which application is used to determine a Data Mover's CIFS server security events that are in the security log?
A. Audit policy snap-in
B. Celerra Monitor
C. Home directory snap-in
D. Server_log
What is stored in a Virtual Data Mover's root file system?
A. Local groups
B. NAS root directory
C. Usermapper configuration
D. VDM logs
Which two allow applications to open files remotely?
A. CIFS and FTP
B. iSCSI and TFTP
C. NFS and CIFS
D. NFS and FTP
Using HyperTerminal and the proper cable, you have connected your service laptop to the Control Station com port. After booting the Control Station with a non-edited boot floppy, you are now at the boot prompt.
Which option could you choose to complete a new install of a Celerra NS?
A. install
B. kickstart
C. serialinstall
D. serialkickstart
What is Intelligent Platform Management Interface (IPMI)?
A. It connects Data Movers together through the use of a crossover cable
B. It connects Data Movers together through the use of a serial spider cable
C. It connects dual Control Stations together through the use of an Ethernet crossover cable
D. It connects the Control Station to the Storage Processor CMI through a serial cable
A large Internet provider set up a Celerra remote replication session. The provider is restructuring its environment and needs to change the IP addresses of both local and remote interfaces used in the replication session.
What needs to be done to change the IP addresses?
A. Abort the replication session, make the changes, start a new replication session
B. New IP addresses are dynamically implemented
C. Suspend the replication session, create IP address aliases for the ports, and restart the replication session
D. Suspend the replication session, make the changes, and restart the replication session
The file system fs01 must be mounted and exported on /mp1 as a CIFS share so only fs01 can be seen by users. To do this, a system administrator will need to
_ mount fs01 to /mp1/fs01 _ export /mp1/fs01 as a CIFS share
What other step will the system administrator need to take to present this share so users only see fs01?
A. create the directory /mp1/fs01 from a Windows host
B. move .etc and lost+found to another directory.
C. mark .etc and lost+found as hidden.
D. unmount fs01 from /mp1
How is Kerberos used within the Active Directory?
A. For user authentication
B. For time synchronization
C. Provides encryption of stored user passwords
D. Provides Dynamic DNS updates
You are implementing an NFS solution for five clients. Four clients can read and write to the export but only one can read.
What action should be taken so that the read-only client can read and write to the export?
A. Add it to the "Root Host" or "read/write Host" security option
B. Clear the "Host access read only export" checkbox
C. Remove it from the "Read-Only Host" security option
D. Remove it from the "Access-Host" security option